Skip to main content

Sort by
Articles

Companies Are Taking a Fresh Approach to Private Cloud

Brett Martin

November 1, 2018

Businesses turn to the cloud for myriad reasons. Chief among them are accelerating and streamlining processes in environments such as the IBM Power Systems* platform, which enable increased speed of execution, agility for applications and better cost efficiency. “Organizations are concerned about time to market and how long it’s going to take to get IT […]

Articles

Secure Service Containers and Consumption-Based Pricing Enable Opportunity

Shirley S. Savage

November 1, 2018

Organizations are eager to capture opportunities that beckon in the marketplace. They know that new and modernized applications are necessary to better serve customers. Organizations also realize that, now more than ever, security remains crucial to business success. In October, IBM announced IBM Secure Service Containers, a new offering that provides benefits for security, as […]

Articles

Chad Rikansrud on Being an Ethical Mainframe Hacker

Reg Harbeck

October 1, 2018

Reg Harbeck: Hi, I’m Reg Harbeck and today I’m here with Chad Rikansrud who is a mainframe hacker at RSM Partners—ethical mainframe hacker—who has got some really interesting background among other things has the interesting Twitter handle of @Bigendiansmalls. So Chad, maybe if you can start by just telling us, how did you end up […]

Articles

The Benefits of Analytics and Machine Learning on IBM Z

September 1, 2018

Enterprises have vast amounts of high-value, sensitive data on IBM Z*. With recent advances in machine learning technology, it’s the right time to extract key insights from this data and monetize it. Given its sensitive nature, it only makes sense to leverage that data in place. Enterprises can also minimize costly data movement and maintain […]

Articles

The Significance of Cybersecurity

Joseph Gulla

August 27, 2018

The foil to cybercrime is cybersecurity—the protection of internet-connected systems including hardware, software and data from cyberattacks.

Articles

The GDPR Is New, but the Requirements Aren’t

George Faucher

July 1, 2018

Data breach studies are revealing shocking statistics. In a 2017 study (ibm.co/2Bir60B), IBM and Ponemon Institute found that the average time it took to discover a data breach was 191 days. In addition, a recent Protenus study (bit.ly/2jUv7gI) found that it took one healthcare organization over four years to discover a data breach. With digital […]

Articles

Rabobank Transforms Its Payments System With DevOps on IBM Z

Shirley S. Savage

July 1, 2018

When global financial services provider Rabobank decided to renovate its payments system four years ago, it took a broad view of the project. The bank assessed its hardware, its payments processing requirements and the need for end-to-end testing of its processes. The result was a payments system built on IBM Z* using DevOps to provide […]

Articles

Tokenized Encryption Helps Merchants Tackle Security Challenges

Ira Chandler

May 1, 2018

As threats to data security proliferate, the actions taken by the governing bodies are evolving. The governing authority for credit card data is the Payment Card Industry (PCI) Security Standards Council (SSC), which was built by the card brands: Visa, MC, Discover, American Express and JCB. The PCI provides the best practices security standards for […]

Articles

IBM z14 Model ZR1 Is Ready for Cloud, Pervasive Encryption and More

Jim Utsler

May 1, 2018

How can medium-sized businesses solve the conundrum of scaling for business growth with ease and confidence? The answer is the latest lean, mean and super fast player in the IBM Z* product line, the IBM z14* Model ZR1. It hits the field of play with a complete new physical system design. In a world where […]

Articles

Linux on IBM Z Positions Clients to Move Forward

Jeff Reser

May 1, 2018

Through the lens of a new wave of technological advances built around advanced analytics, artificial intelligence (AI), machine learning, container development, blockchain, cloud and data security, a strategy shift is occurring in how mainframes are being used and leveraged. At the same time, mainframes are being refreshed with features around Linux*, pervasive encryption, virtualization and performance—all integrated […]

Key Enterprises LLC is committed to ensuring digital accessibility for techchannel.com for people with disabilities. We are continually improving the user experience for everyone, and applying the relevant accessibility standards.